Client Security - Best security for business workstations

4,578 views

Published on

Proactive behavior-based protection combined with automatic software updates and advanced tools to control web access provide the best protection for workstations and laptops.

Client Security offers award-winning protection for Windows computers. F-Secure has received the "Best protection" award from AV-Test four years in a row which clearly shows that you can trust us to keep your PCs safe.

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
4,578
On SlideShare
0
From Embeds
0
Number of Embeds
95
Actions
Shares
0
Downloads
94
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Client Security - Best security for business workstations

  1. 1. SUPERIOR SECURITY FOR BUSINESS WORKSTATIONS
  2. 2. © F-Secure Confidential2      EDWARD SNOWDEN AT CEBIT: “WE HAVE TO IMPROVE THE SECURITY OF OUR END-POINTS.” * Source: Ponemon
  3. 3. © F-Secure Confidential3    Endpoint protection is a core element of cyber security
  4. 4. Don’t compromise Only accept the best security for your company © F-Secure Confidential4
  5. 5.     © F-Secure Confidential5 * With Client Security Premium
  6. 6. © F-Secure Confidential6
  7. 7. ADDED VALUE WITH CLIENT SECURITY PREMIUM © F-Secure Confidential7
  8. 8. © F-Secure Confidential8 WEBCONTENTCONTROL CONNECTIONCONTROL SOFTWAREUPDATER
  9. 9. WEBCONTENTCONTROL © F-Secure Confidential9 Prevent malicious content from entering your network 1. Reduce productivity losses, bandwidth consumption, and legal risks caused by unauthorized employee access to inappropriate or distracting web content 2. Improve security by providing an extra layer of protection
  10. 10. © F-Secure Confidential10 Source: http://www.salary.com/2014-wasting-time-at-work/ 2013 of all respondents said they waste at least some time at work on a daily basis. 69% The number of people in 2014 survey who reported wasting time at work every day is up to a whopping 89% 89% OF PEOPLE SURVEYED WASTE AT LEAST HALF THE AVERAGE WORKDAY ON NON WORK-RELATED TASKS. 4% A 20% INCREASE COMPARED TO LAST YEAR IMPROVEDPRODUCTIVITY THROUGHCONTROLLEDACCESS
  11. 11. © F-Secure Confidential11 WHERE’S THEWASTE? Source: http://www.salary.com/2014-wasting-time-at-work/ GOOGLE FACEBOOK LINKEDIN24% 15% 14% 31% waste roughly 30 minutes daily 31% waste roughly 1 hour daily 16% waste roughly 2 hours daily 6% waste roughly 3 hours daily 2% waste roughly 4 hours daily 2% waste 5 or more hours 89%
  12. 12. IMPROVESECURITY    © F-Secure Confidential12
  13. 13. CONNECTIONCONTROL © F-Secure Confidential13 • Improve security through controlled and safe access to business critical assets • Allows connections during the session to sites which are verified safe by F-Secure • Protects the weakest link in business critical sessions – the web browser
  14. 14. © F-Secure Confidential14 WHYASECURECONNECTION MATTERS?  Financial loss when online banking credentials and money from the bank account is stolen.  Business secrets stolen if cloud-based CRM credentials are stolen
  15. 15. © F-Secure Confidential15 SUPERIOR SECURITY  Activates automatically in the browser when entering a web site  Prevents unknown banking Trojans from sending sensitive information to online criminals  Closes network connections to unknown sites and prevents new ones during session x
  16. 16. © F-Secure Confidential16 STOPTHEATTACKSBEFORE THEYENTER The weakest links: The online bank users and their browsers Banks have secured the connection from browser to the bank and the online banking servers Phishing Trojans
  17. 17. © F-Secure Confidential17 SOFTWARE UPDATER … This provides added value through increased protection (Finding an update + Downloading + Applying) * Number of apps * Number of PCs * € per hour Deploying SWUP * € per hour Cost savings through operational efficiency Automatically patch your software
  18. 18. 18 OUT-OF-DATESOFTWAREISA SIGNIFICANTSECURITYRISK 85% 85% of TOP10 malware could have been avoided with up-to-date software 87% of corporate computers miss critical updates AND YET 87% © F-Secure Confidential
  19. 19. © F-Secure Confidential19 ISWINDOWSBASEDPATCH MANAGEMENTENOUGH? 85% 12% 3% Are in 3rd party software In operating system Miscellaneous
  20. 20. © F-Secure Confidential20 MOSTCOMMONLY MISSINGUPDATES
  21. 21. © F-Secure Confidential21 REALITYOFSOFTWAREUPDATES What has been installed? Updates needed? Security related? Find right ones? Download & install All applications All computers Not enough time!?
  22. 22. © F-Secure Confidential22 SOFTWAREUPDATERISUNIQUE Best detection, automatic updates and integrated management for an affordable package price Unique patch management not just for Windows but also for 3rd party products Automatic deployment of security updates
  23. 23. © F-Secure Confidential23  Best protection against all threats  Control  Software Updater (= patch management)  Proactive protection against threats
  24. 24. NEW KEY SECURITY ELEMENTS IN CLIENT SECURITY © F-Secure Confidential24
  25. 25. © F-Secure Confidential25 ADVANCEDPROTECTION BOTNETBLOCKER
  26. 26. ADVANCEDPROTECTION © F-Secure Confidential26  
  27. 27. © F-Secure Confidential27 STOPMOSTOFTHEWEBATTACKS JAVA 28% FLASH 33% WINDOWS 10% SILVERLIGHT 5% Source: hxxp:// contagiodata.blogspot.fi/2014/12/exploit-kits-2014.html Block 100% of Java applets and Windows malware that come from unknown sources you do not trust. Technologies targeted by exploit kits in 2014-2015
  28. 28.     © F-Secure Confidential28
  29. 29. BOTNETBLOCKER © F-Secure Confidential29   
  30. 30. CLIENT SECURITY FEATURES © F-Secure Confidential30
  31. 31.        © F-Secure Confidential31
  32. 32. ClientSecurityofferspioneeringsecurityfor allWindowsworkstations,whetherdesktops orlaptops.Itsnumerousprotectionlayers, pioneeringtechnologiesandvalue-added functionalitiesensureunprecedented protectionforbusiness. © F-Secure Confidential32
  33. 33. • Key component of security, prevents up- to 85% of all malware in existence • Automatically updates over 3800 different 3rd party software and versions • Creates vulnerability analysis of your environment © F-Secure Confidential33
  34. 34. • Key in constantly reaching protection levels over the industry average • Unmatched protection against advanced 0-Day threats • Sophisticated technology, with heuristic, behavior and reputation analysis • Monitors the most commonly exploited software © F-Secure Confidential34 …
  35. 35. • Protects you by preventing access to malicious sites • 28 different web content categories available • Enforce web content control policies centrally from Policy Manager © F-Secure Confidential35
  36. 36. • Protects you against harmful activity when accessing online banking and other business critical sites • Supports all the major browsers • Closes network connections to unknown sites while enabled in Policy Manager © F-Secure Confidential36
  37. 37. • Web Traffic Scanning Advanced Protection allows the administrator to block selected content from unknown or suspicious sites • Protects the user from typically vulnerable content from websites • The admin can whitelist selected sites © F-Secure Confidential37
  38. 38. • Administrator can prevent network activity relating to known botnets • Blocks Domain Name Server (DNS) queries on the host level • Admin can filter out queries based on domain reputation with option for whitelist © F-Secure Confidential38
  39. 39. • Global protection in 60 seconds from initial detection • Unmatched protection against new emerging malware • Global coverage drastically reduces the window of exposure © F-Secure Confidential39
  40. 40. • Highly-advanced anti-malware platform, using multi-engine detection capabilities • Offers vastly better security coverage without being reliant on single technology • Provides unmatched protection against viruses, trojans, rootkits and other malware © F-Secure Confidential40
  41. 41. • Ensures that employees can work safely and efficiently online without worries • Proactively prevents employees from accessing harmful sites, links or contents • Removes human error and proactively minimizes exposure • Works with all major browsers © F-Secure Confidential41
  42. 42. • Gives an extra layer of protection against malicious network activities • Manage firewall rules and profiles remotely, and assign them based on device type • Works dynamically with DeepGuard and Application Control © F-Secure Confidential42
  43. 43. • Better manageability for USB devices • Prevents malware infections via USB • Administrator can be notified if device has been blocked © F-Secure Confidential43
  44. 44. © F-Secure Confidential44 GET SERIOUS ABOUT ENDPOINT PROTECTION

×